SlideShare a Scribd company logo
1 of 101
Join Us:
https://www.linkedin.com/compa
ny/application-security-virtual-
meetups
QR Link:
Trending Actual Cloud Attacks - Eliminate the
noise
Alex Geleg
Trending
Actual
Cloud
Attacks
Eliminate the noise
@alexpeleg
alex@cynergy.app
Exploiting
exposed cloud
instances
Attack Flow
Attacker’s
Machine
Vulnerable
Cloud Hosted
Website
Cloud
Instance/Pod
Internal
Infrastructure
Roles and
Permissions
Impact
• Reputation
• Disruption of Service
• Leakage of sensitive data
• Regulatory fines
Mitigation
Access to internal services
Restrict
Continuously for web and infrastructure vulnerabilities
Scan
Privileges and Roles
Control
Access to
Sensitive Data
Attack Flow
Attacker’s
Machine
Organization
GitHub
Cloud
accounts and
resources
S3 buckets and Blobs
Website Source Code
API-Keys
And Secret keys
Impact
• Financial damage from key abuse
• Infrastructure access and takeover
• Sensitive data leakage
Mitigation
Git, Web Applications and Exposed Storage
Scan
Developers not to store cleartext keys
Train
Control Privileges
Control
Poor Identity
protection
Attack Flow
Attacker’s
Machine
Compromised
Credentials
Accounts and
resources
Cloud Identity
Impact
• Lack of detection
• Long time organization assets abuse
• Cloud Account takeover
Mitigation
a strong and long Password Policy
Maintain
Multi Factor Authentication (MFA)
Enable
Inactive Identities and empty groups
Delete
Access Keys
Rotate
Thank
You!
@alexpeleg
alex@cynergy.app
Reducing Operational Costs by Automating
Data Security
Ben Herzberg
January 2023
© 2023 Satori Inc. All rights reserved.
Reducing Operational
Costs by Automating
Data Security
20
About Me
@KernelXSS
https://www.linkedin.com/in/sysadmin
ben@satoricyber.com
● Co-author of “Snowflake
Security” (Apress)
● A DataSecOps Guy
● Chief Scientist, Satori
● Now also VPM :)
● Formerly:
○ Head of Research
(Imperva)
○ CTO (Cynet)
21
Agenda
● Data & Data Security
● DataSecOps
● Why Automate? And Why Now?
● What & How Do You Automate?
● Examples
● Q&A
Intro: Data and
Data Security
23
*Source: Statista, 7 June 2021 .
24
Default To Know
Need To Know
Need To Share
25
Everybody
wants
value from
data
26
Data Teams
Data-Driven Value
27
Data
is getting
hard to
control
28
More
risks
around
data
Compliance
Security
Privacy
Operational
DataSecOps
30
Learning From DevOps
31
DevOops
DevOps as a team, not as a mindset
Misconfigurations and Change
Management
Cost of security-as-a-patch can be high
Security has to be bolted into the process!
32
From DevOps to DevSecOps
● Shift-left
● Incremental changes
● Automation
● Security is embedded into the
process
Source: https://meming.world
33
So… What’s DataSecOps?
An agile, holistic, security-embedded approach to
coordination of the ever-changing data and its users,
aimed at delivering quick data-to-value, while keeping
data private, safe and well-governed.
34
DataSecOps Principles
● Security as continuous part of their data operations,
not an afterthought
● Ad-hoc continuous
● Separation of environments, testing & automation
● Prioritization is key - mostly sensitive data
● Data is clearly owned
● Simplified & deterministic data access
35
DataSecOps
Data-Driven Value
36
Would you do Manual DevSecOps?
Why Automate?
We are a billion dollar company but
anyone can run a SQL query and
get a million email addresses.
VP Data Engineering, SaaS Company
‫״‬ I have an army of people creating
users, roles and views. By the time
they are done, it's already outdated.
CDO, Financial Services Company
‫״‬
Security vs. Productivity
We all know…
29% loss of revenue due
to Data Breach.
But this is AS IMPORTANT…
Between 60% and 85% of
data projects fail.
DevOps + Data
engineering teams
experience 20%-30% loss
of productivity.
Or looking at it from another perspective…
62% says security & compliance
slows down data projects
71%-79% Of Data Leaders
Deal with PII
Automated Compliance
Always know
where data is, who has
access to it, what are
they doing with it
Tight Security
User can only access
data they need when
they need it
Productivity
Central governance,
distributed operations
with no restrictions on
data architecture
Key benefits of Just-in-Time Automated Access
Why (especially)
Now?
What & How To
Automate
46
What To Automate?
● Whatever:
○ has the most effect on security & compliance
○ is taking its toll
● Meaning:
○ Log processing
○ Data access (Authentication & Authorization)
○ Security policies
47
The Challenge
● Security teams are in charge of security
● Data is (usually) a black box
48
The Journey to Access Automation
Level 1 Level 2 Level 3
Data Access Model Ad-hoc Access Basic Access
Management
Just-in-Time Access
Provisioning Employees get access
upfront when they join or
ad-hoc when requested.
Basic RBAC framework. Employees get access
Just-in-Time based on
business needs.
Permissions Persistence 100% High 90% Based on business needs
(~20%)
Automation Fully manual Role provisioning
Some policies
Fully automated
Typical Time 1-3 months 6-9 months 12-18 months
49
How?
● DIY
● Orchestration
● Data Security Platform 😸
Some Automation
Results
51
DevOps: Access To Production
● Productivity was NOT top concern.
● 25% of DevOps time was spent on granting/revoking
permissions, etc.
● Moving to JIT → several headcounts are now working on
MEANINGFUL things.
● Factors: # data users, grant time, revoke time,
monitoring time, pager duties
52
Data Engineers: DWH
● Project initiated by the data team (DIY)
● Tale chasing:
○ Masking, RLS
○ Managing RBAC, ABAC
○ Moving targets
● # data users, time to set policies which gets longer,
roles management/explosion
Conclusion
54
Takeaways
● It’s 2023
● Got data? users? congrats, you need to automate.
● Choose how!
55
Thanks! (+Questions)
@KernelXSS
https://www.linkedin.com/in/sysadmin
ben@satoricyber.com
Keep in touch!
Read More
satoricyber.com
blog.satoricyber.com
Keep your BigQuery data encrypted
Ran Tibi
Keep your BigQuery
data encrypted
Ran Tibi
58
59
Application
BigQuery
60
Application
BigQuery
GCS
61
Application
BigQuery
GCS
PubSub Dataflow
62
{"id": "1", "email": "ran@example.com"}
{"id": "2", "email": "rose@example.com"}
{"id": "3", "email": "fox@example.com"}
{"id": "4", "email": "pilot@example.com"}
users.json
63
64
Application
BigQuery
GCS
PubSub Dataflow
65
Application
BigQuery
GCS
PubSub Dataflow
Encryption in transit
SSL
SSL
SSL
SSL
SSL
SSL
SSL
66
Application
BigQuery
GCS
PubSub Dataflow
Encryption in transit
Encryption at rest
SSL
SSL
SSL
SSL
SSL
SSL
SSL
67
68
Application
BigQuery
GCS
PubSub Dataflow
Encryption in transit
Encryption at rest
Application layer
encryption
SSL
SSL
SSL
SSL
SSL
SSL
SSL
69
SELECT email,
DECRYPT(email) decrypted_email
FROM `app.users_encrypted`
70
AEAD Functions
Authenticated Encryption with Associated Data
● Encrypt
● Decrypt
● Create keyset
● …
71
72
DECLARE keyset BYTES;
set keyset = from_base64('CKeEwo...MOqyAB');
select
email,
DETERMINISTIC_DECRYPT_STRING(keyset, email, "") AS decrypted_email
FROM `aead-poc.app.users_encrypted`;
73
DECLARE keyset BYTES;
set keyset = from_base64('CKeEwo...MOqyAB');
select
email,
DETERMINISTIC_DECRYPT_STRING(keyset, email, "") AS decrypted_email
FROM `aead-poc.app.users_encrypted`;
74
But…
DECLARE keyset BYTES;
set keyset = from_base64('CKeEwo...MOqyAB');
select
email,
DETERMINISTIC_DECRYPT_STRING(keyset, email, "") AS decrypted_email
FROM `aead-poc.app.users_encrypted`;
75
DEK
Data Encryption Key
KEK
Key Encryption Key
Symmetric
Encryption
Wrapper
Encrypted DEK
Data encryption / decryption process
76
76
DEK
KEK
Symmetric
Decryption
Wrapper
Encryption
Algorithm
Sensitive
message
Encrypted
message
Encryption
Decryption
Google KMS
✔ Create key
✔ Encrypt / Decrypt
✘ Export key
77
78
DEK Wrapper
Encrypted DEK
KEK
Google
KMS
encrypt
Runtime encryption process using KMS
79
79
DEK
KEK
Application
Wrapper
Encryption
Algorithm
Sensitive
message
Encrypted
message
Encryption
Decryption
Google
KMS
decrypt
80
gcloud kms keyrings create poc-keyring 
--location us-central1
gcloud kms keys create kek 
--keyring poc-keyring 
--location us-central1 
--purpose "encryption"
Create KEK in KMS
81
SET kms_resource_name = 'gcp-kms://projects/aead-
poc/locations/us-central1/keyRings/poc-
keyring/cryptoKeys/kek';
SELECT KEYS.NEW_WRAPPED_KEYSET(
kms_resource_name,
'DETERMINISTIC_AEAD_AES_SIV_CMAC_256')
Generate wrapper
82
CJ6fqK4GEmQKWAowdHlwZS5nb29nbGVhcGlzL
mNvbS9nb29nbGUuY3J5cHRvLnRpbmsuQWVzR2
NtS2V5EiIaIOpnR2FJQUAwmaCGcBBUxAmw7HD
UOGP//YAe3PkJ5AeEGAEQARien6iuBiAB
On-demand decrypt in BigQuery
83
SET KMS_RESOURCE_NAME = 'gcp-kms://projects/aead-
poc/locations/us-central1/keyRings/poc-
keyring/cryptoKeys/kek';
SET WRAPPER =
FROM_BASE64("CiQA14LE......................brY9fZ3U=");
SELECT
email,
DETERMINISTIC_DECRYPT_STRING(
KEYS.KEYSET_CHAIN(KMS_RESOURCE_NAME, WRAPPER),
email, "") decrypted_email
FROM `aead-poc.app.users_encrypted`
On-demand decrypt in BigQuery
84
SET KMS_RESOURCE_NAME = 'gcp-kms://projects/aead-
poc/locations/us-central1/keyRings/poc-
keyring/cryptoKeys/kek';
SET WRAPPER =
FROM_BASE64("CiQA14LE......................brY9fZ3U=");
SELECT
email,
DETERMINISTIC_DECRYPT_STRING(
KEYS.KEYSET_CHAIN(KMS_RESOURCE_NAME, WRAPPER),
email, "") decrypted_email
FROM `aead-poc.app.users_encrypted`
On-demand decrypt in BigQuery
85
CREATE OR REPLACE FUNCTION `aead-poc.app.decrypt`(encodedText bytes)
RETURNS STRING AS (
DETERMINISTIC_DECRYPT_STRING(
KEYS.KEYSET_CHAIN('gcp-kms://projects/aead-
poc/locations/us-central1/keyRings/poc-
keyring/cryptoKeys/kek',
b'004324........003'),
encodedText, "")
);
SELECT email,
`aead-poc.app.decrypt`(email) decrypted_email
FROM `app.users_encrypted`
86
IAM
roles/cloudkms.cryptoKeyEncrypterDecrypter
VS
roles/cloudkms.cryptoKeyEncrypterDecrypterViaDelegation
87
IAM
roles/cloudkms.cryptoKeyEncrypterDecrypter
VS
roles/cloudkms.cryptoKeyEncrypterDecrypterViaDelegation
88
No one except for the application
runtime has access to the DEK
89
Use Tink for encryption in application side
90
import tink
daead.register()
keyset_handle = tink.KeysetHandle.read(
tink.JsonKeysetReader('{"encryptedKeyset":"Ci..g=",...}'),
gcpkms.GcpKmsClient('',gcp_credential_path)
.get_aead('gcp-kms://projects/…/kek'))
cipher = keyset_handle.primitive(daead.DeterministicAead)
ciphertext = cipher.encrypt_deterministically(b'plaintext', b'')
plaintext = cipher.decrypt_deterministically(ciphertext, b'')
Decrypt the wrapper
Wrapper
KEK URI
Create Cipher object
Encrypt / Decrypt using the DEK
On-demand encrypt in BigQuery
91
SET KMS_RESOURCE_NAME = 'gcp-kms://projects/aead-
poc/locations/us-central1/keyRings/poc-
keyring/cryptoKeys/kek';
SET WRAPPER =
FROM_BASE64("CiQA14LE......................brY9fZ3U=");
CREATE TABLE `aead-poc.app.users_encrypted` as
SELECT
DETERMINISTIC_ENCRYPT(
KEYS.KEYSET_CHAIN(KMS_RESOURCE_NAME, WRAPPER),
email, "") email
FROM `aead-poc.app.users`
92
Application
BigQuery
GCS
PubSub Dataflow
Encryption in transit
Encryption at rest
Application layer
encryption
SSL
SSL
SSL
SSL
SSL
SSL
SSL
Deterministic VS Nondeterministic
93
Performance
94
100M
Records
64
Bytes
Plain text Decrypt first
Elapsed time Slot time Elapsed time Slot time
Substring + group by 14 sec 10 min 15 sec 18 min
Select distinct 21 sec 23 min 22 sec 35 min
~50-80%
Almost the same
Pricing
95
SET KMS_RESOURCE_NAME = 'gcp-kms://projects/aead-
poc/locations/us-central1/keyRings/poc-
keyring/cryptoKeys/kek';
SET WRAPPER =
FROM_BASE64("CiQA14LE......................brY9fZ3U=");
SELECT
DETERMINISTIC_DECRYPT_STRING(
KEYS.KEYSET_CHAIN(KMS_RESOURCE_NAME, WRAPPER),
email, "") decrypted_email
FROM `aead-poc.app.users_encrypted`
Pricing
96
Storage overhead
21 Bytes per encrypted field
Limitations
● Key per tenant - not supported
97
select
email,
DETERMINISTIC_DECRYPT_STRING(
KEYS.KEYSET_CHAIN(KMS_RESOURCE_NAME, tp.wrapper),
email, "") AS decrypted_email
FROM `aead-poc.app.users_encrypted`
JOIN `aead-poc.app.tenants_wrappers` tw
USING (tenant_id)
Keep it in mind
98
Follow me
runtibi@gmail.com
/rantibi
@rantb
99
Q & A
100
Thank You!
Questions?
To be continued…
https://www.linkedin.com/company/application-security-virtual-meetups

More Related Content

Similar to Join Our LinkedIn Group and Learn How to Eliminate Noise in Cloud Security Attacks

Rethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldRethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldHao Tran
 
Rethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldRethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldInside Analysis
 
Fundamentals of Microsoft 365 Security , Identity and Compliance
Fundamentals of Microsoft 365 Security , Identity and ComplianceFundamentals of Microsoft 365 Security , Identity and Compliance
Fundamentals of Microsoft 365 Security , Identity and ComplianceVignesh Ganesan I Microsoft MVP
 
Redgate_summit_atl_kgorman_intersection.pptx
Redgate_summit_atl_kgorman_intersection.pptxRedgate_summit_atl_kgorman_intersection.pptx
Redgate_summit_atl_kgorman_intersection.pptxKellyn Pot'Vin-Gorman
 
IRJET- Exchanging Secure Data in Cloud with Confidentiality and Privacy Goals
IRJET- Exchanging Secure Data in Cloud with Confidentiality and Privacy GoalsIRJET- Exchanging Secure Data in Cloud with Confidentiality and Privacy Goals
IRJET- Exchanging Secure Data in Cloud with Confidentiality and Privacy GoalsIRJET Journal
 
4 Cyber Security KPIs
4 Cyber Security KPIs4 Cyber Security KPIs
4 Cyber Security KPIsSteven Aiello
 
Big data analytics enterprise and cloud computing
Big data analytics enterprise and cloud computingBig data analytics enterprise and cloud computing
Big data analytics enterprise and cloud computingCloud Credential Council
 
How to Deliver Closed-Loop Compliance
How to Deliver Closed-Loop ComplianceHow to Deliver Closed-Loop Compliance
How to Deliver Closed-Loop ComplianceForgeRock
 
Security Architecture Best Practices for SaaS Applications
Security Architecture Best Practices for SaaS ApplicationsSecurity Architecture Best Practices for SaaS Applications
Security Architecture Best Practices for SaaS ApplicationsTechcello
 
Protect your Database with Data Masking & Enforced Version Control
Protect your Database with Data Masking & Enforced Version Control	Protect your Database with Data Masking & Enforced Version Control
Protect your Database with Data Masking & Enforced Version Control DBmaestro - Database DevOps
 
Should healthcare abandon the cloud final
Should healthcare abandon the cloud finalShould healthcare abandon the cloud final
Should healthcare abandon the cloud finalsapenov
 
Security architecture best practices for saas applications
Security architecture best practices for saas applicationsSecurity architecture best practices for saas applications
Security architecture best practices for saas applicationskanimozhin
 
APIsecure 2023 - Approaching Multicloud API Security USing Metacloud, David L...
APIsecure 2023 - Approaching Multicloud API Security USing Metacloud, David L...APIsecure 2023 - Approaching Multicloud API Security USing Metacloud, David L...
APIsecure 2023 - Approaching Multicloud API Security USing Metacloud, David L...apidays
 
Trusting External Identity Providers for Global Research Collaborations
Trusting External Identity Providers for Global Research CollaborationsTrusting External Identity Providers for Global Research Collaborations
Trusting External Identity Providers for Global Research Collaborationsjbasney
 
SharePoint Online vs. On-Premise
SharePoint Online vs. On-PremiseSharePoint Online vs. On-Premise
SharePoint Online vs. On-PremiseEvan Hodges
 
Digital_IOT_(Microsoft_Solution).pdf
Digital_IOT_(Microsoft_Solution).pdfDigital_IOT_(Microsoft_Solution).pdf
Digital_IOT_(Microsoft_Solution).pdfssuserd23711
 
Top five configuration security errors and how to avoid them - DEM09-S - Chic...
Top five configuration security errors and how to avoid them - DEM09-S - Chic...Top five configuration security errors and how to avoid them - DEM09-S - Chic...
Top five configuration security errors and how to avoid them - DEM09-S - Chic...Amazon Web Services
 
Challenges of Operationalising Data Science in Production
Challenges of Operationalising Data Science in ProductionChallenges of Operationalising Data Science in Production
Challenges of Operationalising Data Science in Productioniguazio
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackThousandEyes
 
SACON - Beyond corp (Arnab Chattopadhayay)
SACON - Beyond corp (Arnab Chattopadhayay)SACON - Beyond corp (Arnab Chattopadhayay)
SACON - Beyond corp (Arnab Chattopadhayay)Priyanka Aash
 

Similar to Join Our LinkedIn Group and Learn How to Eliminate Noise in Cloud Security Attacks (20)

Rethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldRethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile World
 
Rethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldRethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile World
 
Fundamentals of Microsoft 365 Security , Identity and Compliance
Fundamentals of Microsoft 365 Security , Identity and ComplianceFundamentals of Microsoft 365 Security , Identity and Compliance
Fundamentals of Microsoft 365 Security , Identity and Compliance
 
Redgate_summit_atl_kgorman_intersection.pptx
Redgate_summit_atl_kgorman_intersection.pptxRedgate_summit_atl_kgorman_intersection.pptx
Redgate_summit_atl_kgorman_intersection.pptx
 
IRJET- Exchanging Secure Data in Cloud with Confidentiality and Privacy Goals
IRJET- Exchanging Secure Data in Cloud with Confidentiality and Privacy GoalsIRJET- Exchanging Secure Data in Cloud with Confidentiality and Privacy Goals
IRJET- Exchanging Secure Data in Cloud with Confidentiality and Privacy Goals
 
4 Cyber Security KPIs
4 Cyber Security KPIs4 Cyber Security KPIs
4 Cyber Security KPIs
 
Big data analytics enterprise and cloud computing
Big data analytics enterprise and cloud computingBig data analytics enterprise and cloud computing
Big data analytics enterprise and cloud computing
 
How to Deliver Closed-Loop Compliance
How to Deliver Closed-Loop ComplianceHow to Deliver Closed-Loop Compliance
How to Deliver Closed-Loop Compliance
 
Security Architecture Best Practices for SaaS Applications
Security Architecture Best Practices for SaaS ApplicationsSecurity Architecture Best Practices for SaaS Applications
Security Architecture Best Practices for SaaS Applications
 
Protect your Database with Data Masking & Enforced Version Control
Protect your Database with Data Masking & Enforced Version Control	Protect your Database with Data Masking & Enforced Version Control
Protect your Database with Data Masking & Enforced Version Control
 
Should healthcare abandon the cloud final
Should healthcare abandon the cloud finalShould healthcare abandon the cloud final
Should healthcare abandon the cloud final
 
Security architecture best practices for saas applications
Security architecture best practices for saas applicationsSecurity architecture best practices for saas applications
Security architecture best practices for saas applications
 
APIsecure 2023 - Approaching Multicloud API Security USing Metacloud, David L...
APIsecure 2023 - Approaching Multicloud API Security USing Metacloud, David L...APIsecure 2023 - Approaching Multicloud API Security USing Metacloud, David L...
APIsecure 2023 - Approaching Multicloud API Security USing Metacloud, David L...
 
Trusting External Identity Providers for Global Research Collaborations
Trusting External Identity Providers for Global Research CollaborationsTrusting External Identity Providers for Global Research Collaborations
Trusting External Identity Providers for Global Research Collaborations
 
SharePoint Online vs. On-Premise
SharePoint Online vs. On-PremiseSharePoint Online vs. On-Premise
SharePoint Online vs. On-Premise
 
Digital_IOT_(Microsoft_Solution).pdf
Digital_IOT_(Microsoft_Solution).pdfDigital_IOT_(Microsoft_Solution).pdf
Digital_IOT_(Microsoft_Solution).pdf
 
Top five configuration security errors and how to avoid them - DEM09-S - Chic...
Top five configuration security errors and how to avoid them - DEM09-S - Chic...Top five configuration security errors and how to avoid them - DEM09-S - Chic...
Top five configuration security errors and how to avoid them - DEM09-S - Chic...
 
Challenges of Operationalising Data Science in Production
Challenges of Operationalising Data Science in ProductionChallenges of Operationalising Data Science in Production
Challenges of Operationalising Data Science in Production
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT Stack
 
SACON - Beyond corp (Arnab Chattopadhayay)
SACON - Beyond corp (Arnab Chattopadhayay)SACON - Beyond corp (Arnab Chattopadhayay)
SACON - Beyond corp (Arnab Chattopadhayay)
 

More from lior mazor

The Power of Malware Analysis and Development.pdf
The Power of Malware Analysis and Development.pdfThe Power of Malware Analysis and Development.pdf
The Power of Malware Analysis and Development.pdflior mazor
 
The CISO Problems Risk Compliance Management in a Software Development 030420...
The CISO Problems Risk Compliance Management in a Software Development 030420...The CISO Problems Risk Compliance Management in a Software Development 030420...
The CISO Problems Risk Compliance Management in a Software Development 030420...lior mazor
 
Reveal the Security Risks in the software Development Lifecycle Meetup 060320...
Reveal the Security Risks in the software Development Lifecycle Meetup 060320...Reveal the Security Risks in the software Development Lifecycle Meetup 060320...
Reveal the Security Risks in the software Development Lifecycle Meetup 060320...lior mazor
 
The Hacking Games - A Road to Post Exploitation Meetup - 20240222.pptx
The Hacking Games - A Road to Post Exploitation Meetup - 20240222.pptxThe Hacking Games - A Road to Post Exploitation Meetup - 20240222.pptx
The Hacking Games - A Road to Post Exploitation Meetup - 20240222.pptxlior mazor
 
Secure Your DevOps Pipeline Best Practices Meetup 08022024.pptx
Secure Your DevOps Pipeline Best Practices Meetup 08022024.pptxSecure Your DevOps Pipeline Best Practices Meetup 08022024.pptx
Secure Your DevOps Pipeline Best Practices Meetup 08022024.pptxlior mazor
 
Why 2024 will become the Year of SaaS Security Meetup 24012024.pptx
Why 2024 will become the Year of SaaS Security Meetup 24012024.pptxWhy 2024 will become the Year of SaaS Security Meetup 24012024.pptx
Why 2024 will become the Year of SaaS Security Meetup 24012024.pptxlior mazor
 
Vulnerability Alert Fatigue and Malicious Code Attacks Meetup 11012024.pdf
Vulnerability Alert Fatigue and Malicious Code Attacks Meetup 11012024.pdfVulnerability Alert Fatigue and Malicious Code Attacks Meetup 11012024.pdf
Vulnerability Alert Fatigue and Malicious Code Attacks Meetup 11012024.pdflior mazor
 
The Hacking Game - Think Like a Hacker Meetup 12072023.pptx
The Hacking Game - Think Like a Hacker Meetup 12072023.pptxThe Hacking Game - Think Like a Hacker Meetup 12072023.pptx
The Hacking Game - Think Like a Hacker Meetup 12072023.pptxlior mazor
 
Sailing Through The Storm of Kubernetes CVEs Meetup 29062023.pptx
Sailing Through The Storm of Kubernetes CVEs Meetup 29062023.pptxSailing Through The Storm of Kubernetes CVEs Meetup 29062023.pptx
Sailing Through The Storm of Kubernetes CVEs Meetup 29062023.pptxlior mazor
 
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptxEmphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptxlior mazor
 
The Hacking Games - Cloud Vulnerabilities Meetup 22032023.pptx
The Hacking Games - Cloud Vulnerabilities Meetup 22032023.pptxThe Hacking Games - Cloud Vulnerabilities Meetup 22032023.pptx
The Hacking Games - Cloud Vulnerabilities Meetup 22032023.pptxlior mazor
 
The Hacking Games - Operation System Vulnerabilities Meetup 29112022
The Hacking Games - Operation System Vulnerabilities Meetup 29112022The Hacking Games - Operation System Vulnerabilities Meetup 29112022
The Hacking Games - Operation System Vulnerabilities Meetup 29112022lior mazor
 
Software Supply Chain Security Meetup 21062022
Software Supply Chain Security Meetup 21062022Software Supply Chain Security Meetup 21062022
Software Supply Chain Security Meetup 21062022lior mazor
 
Application Security - Dont leave your AppSec for the last moment Meetup 2104...
Application Security - Dont leave your AppSec for the last moment Meetup 2104...Application Security - Dont leave your AppSec for the last moment Meetup 2104...
Application Security - Dont leave your AppSec for the last moment Meetup 2104...lior mazor
 
User management - the next-gen of authentication meetup 27012022
User management - the next-gen of authentication meetup 27012022User management - the next-gen of authentication meetup 27012022
User management - the next-gen of authentication meetup 27012022lior mazor
 
Securing and automating your application infrastructure meetup 23112021 b
Securing and automating your application infrastructure meetup 23112021 bSecuring and automating your application infrastructure meetup 23112021 b
Securing and automating your application infrastructure meetup 23112021 blior mazor
 
Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021lior mazor
 
Application security meetup - cloud security best practices 24062021
Application security meetup - cloud security best practices 24062021Application security meetup - cloud security best practices 24062021
Application security meetup - cloud security best practices 24062021lior mazor
 
Application security meetup data privacy_27052021
Application security meetup data privacy_27052021Application security meetup data privacy_27052021
Application security meetup data privacy_27052021lior mazor
 
Application security meetup 02032021
Application security meetup 02032021Application security meetup 02032021
Application security meetup 02032021lior mazor
 

More from lior mazor (20)

The Power of Malware Analysis and Development.pdf
The Power of Malware Analysis and Development.pdfThe Power of Malware Analysis and Development.pdf
The Power of Malware Analysis and Development.pdf
 
The CISO Problems Risk Compliance Management in a Software Development 030420...
The CISO Problems Risk Compliance Management in a Software Development 030420...The CISO Problems Risk Compliance Management in a Software Development 030420...
The CISO Problems Risk Compliance Management in a Software Development 030420...
 
Reveal the Security Risks in the software Development Lifecycle Meetup 060320...
Reveal the Security Risks in the software Development Lifecycle Meetup 060320...Reveal the Security Risks in the software Development Lifecycle Meetup 060320...
Reveal the Security Risks in the software Development Lifecycle Meetup 060320...
 
The Hacking Games - A Road to Post Exploitation Meetup - 20240222.pptx
The Hacking Games - A Road to Post Exploitation Meetup - 20240222.pptxThe Hacking Games - A Road to Post Exploitation Meetup - 20240222.pptx
The Hacking Games - A Road to Post Exploitation Meetup - 20240222.pptx
 
Secure Your DevOps Pipeline Best Practices Meetup 08022024.pptx
Secure Your DevOps Pipeline Best Practices Meetup 08022024.pptxSecure Your DevOps Pipeline Best Practices Meetup 08022024.pptx
Secure Your DevOps Pipeline Best Practices Meetup 08022024.pptx
 
Why 2024 will become the Year of SaaS Security Meetup 24012024.pptx
Why 2024 will become the Year of SaaS Security Meetup 24012024.pptxWhy 2024 will become the Year of SaaS Security Meetup 24012024.pptx
Why 2024 will become the Year of SaaS Security Meetup 24012024.pptx
 
Vulnerability Alert Fatigue and Malicious Code Attacks Meetup 11012024.pdf
Vulnerability Alert Fatigue and Malicious Code Attacks Meetup 11012024.pdfVulnerability Alert Fatigue and Malicious Code Attacks Meetup 11012024.pdf
Vulnerability Alert Fatigue and Malicious Code Attacks Meetup 11012024.pdf
 
The Hacking Game - Think Like a Hacker Meetup 12072023.pptx
The Hacking Game - Think Like a Hacker Meetup 12072023.pptxThe Hacking Game - Think Like a Hacker Meetup 12072023.pptx
The Hacking Game - Think Like a Hacker Meetup 12072023.pptx
 
Sailing Through The Storm of Kubernetes CVEs Meetup 29062023.pptx
Sailing Through The Storm of Kubernetes CVEs Meetup 29062023.pptxSailing Through The Storm of Kubernetes CVEs Meetup 29062023.pptx
Sailing Through The Storm of Kubernetes CVEs Meetup 29062023.pptx
 
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptxEmphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
 
The Hacking Games - Cloud Vulnerabilities Meetup 22032023.pptx
The Hacking Games - Cloud Vulnerabilities Meetup 22032023.pptxThe Hacking Games - Cloud Vulnerabilities Meetup 22032023.pptx
The Hacking Games - Cloud Vulnerabilities Meetup 22032023.pptx
 
The Hacking Games - Operation System Vulnerabilities Meetup 29112022
The Hacking Games - Operation System Vulnerabilities Meetup 29112022The Hacking Games - Operation System Vulnerabilities Meetup 29112022
The Hacking Games - Operation System Vulnerabilities Meetup 29112022
 
Software Supply Chain Security Meetup 21062022
Software Supply Chain Security Meetup 21062022Software Supply Chain Security Meetup 21062022
Software Supply Chain Security Meetup 21062022
 
Application Security - Dont leave your AppSec for the last moment Meetup 2104...
Application Security - Dont leave your AppSec for the last moment Meetup 2104...Application Security - Dont leave your AppSec for the last moment Meetup 2104...
Application Security - Dont leave your AppSec for the last moment Meetup 2104...
 
User management - the next-gen of authentication meetup 27012022
User management - the next-gen of authentication meetup 27012022User management - the next-gen of authentication meetup 27012022
User management - the next-gen of authentication meetup 27012022
 
Securing and automating your application infrastructure meetup 23112021 b
Securing and automating your application infrastructure meetup 23112021 bSecuring and automating your application infrastructure meetup 23112021 b
Securing and automating your application infrastructure meetup 23112021 b
 
Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021
 
Application security meetup - cloud security best practices 24062021
Application security meetup - cloud security best practices 24062021Application security meetup - cloud security best practices 24062021
Application security meetup - cloud security best practices 24062021
 
Application security meetup data privacy_27052021
Application security meetup data privacy_27052021Application security meetup data privacy_27052021
Application security meetup data privacy_27052021
 
Application security meetup 02032021
Application security meetup 02032021Application security meetup 02032021
Application security meetup 02032021
 

Recently uploaded

ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...OnePlan Solutions
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaHanief Utama
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Velvetech LLC
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEEVICTOR MAESTRE RAMIREZ
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....kzayra69
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based projectAnoyGreter
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfAlina Yurenko
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024StefanoLambiase
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanyChristoph Pohl
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Hr365.us smith
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作qr0udbr0
 

Recently uploaded (20)

ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief Utama
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEE
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based project
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
 
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作
 

Join Our LinkedIn Group and Learn How to Eliminate Noise in Cloud Security Attacks